Computer Self-help Resources
FAQs, documentation & advice
Health | Computer Basics | Internet | Security & Privacy | Identity Theft
Windows | Other Operating Systems | Software | Website Design
About these Resources | Requesting Help | Site Linking Guidelines

Phone calls from a “technical support” person saying that you have a problem with your computer are scams. Just hang up.
Vishing (phone) and phishing (email) scams are designed to steal from you.
Health & Medical
Computer Basics
Terminology
Tips & Technologies
- Artificial Intelligence (AI)
- Clean up your devices
- Safely disposing of computers & devices
- How to do a screen capture
- The changing nature of computing
Networks
- Home Networking
- Sharing files on a network
- Apps that can't connect
- Firewalls: Your first line of defense
- Troubleshooting Internet connections
The Internet
- The “Cloud”
- Search engines & databases
- Copyright: who owns content on the Internet?
- Verifying information
- Google's monopoly
- The open Internet at risk
- Canadian legislation
Security & Privacy
- Preventing unauthorized access
- Protecting your computers & network
- Security strategies
- Passwords: protecting your electronic signature
- Your privacy at risk
- Data inheritance
- Safer browsing
- Social media
Identity Theft: Spam, Vishing & Phishing
- Identity theft — obtaining information by deceit
- Computer & “tech support” scams
- Spam: unsolicited email & mailing lists
- Phishing: scamming by email
- Vishing: scamming by phone
Microsoft Windows
Windows Basics
- Windows: an overview
- Windows basics — general concepts & terminology
- Troubleshooting Microsoft services
Current (Supported) Versions
- Windows 11 (no official end of support)
- Windows 10 (October 14, 2025)
- Replacing Windows: upgrading when support ends
Recovering Your Windows Installation
Legacy (Unsupported) Windows
Support has expired for these versions and they are unsafe to use.
- Windows 8.1
Legacy
- Windows 7
Legacy
- Windows Vista
Legacy
- Windows XP
Legacy
Alternatives to Windows
- Linux — distributions, desktops & documentation
- macOS: information, software & troubleshooting
- Chromebooks
- ArcaOS
- eComStation
- IBM OS/2
Legacy
- Dual-booting, partitions & file systems
Legacy
- Java cross-platform environment
Legacy
Software
Recommended Software
- Recommended software: useful & reliable programs
- Internet | PDF | Graphics | VLC Player
- Office Suites | Editors | Utilities
- Updating: dealing with obsolescence
- Subscription services
- SaaS: Software as a Service
- Artificial Intelligence
- Able2Extract Pro 19
- Web browsers
- Browser extensions
- Browser plugins are vulnerable
Legacy
- Email software
- Video conferencing software: virtual online meetings
- Joining a Webex meeting
- Shareware & freeware: definitions & sources
Security Software
- Security software: evaluations & solutions
- ZoneAlarm security products
- Kaspersky security products
- Malware: detection & removal
- Ransomware: holding your digital life for ransom
- Vulnerabilities in Internet software
- Firewalls: your first line of defense
- Windows vulnerabilities
- Mobile security — vulnerabilities in mobile devices
Email Issues
- Email troubleshooting
- Safer email
- Effective email newsletters
- Correctly using To, CC & BCC
- Spam: unsolicited emails and mailing lists
- Phishing: email scams
Web Browser Issues
- Safer browsing
- Vulnerabilities in Internet software
- Stop autoplay in browsers
- Browser troubleshooting
- Can't see new website content?
- Safer browsing
Website Design
Building a Website
- Web Design Primer
- HTML5: Improved web technologies
- HTML, JavaScript, SEO & standards
- Illustrating websites: effective graphics & stock photos
- Cut 'n paste HTML editing
Design Issues
The power of CSS
These are two identical pages except that CSS is disabled in the second example:
- Alice with CSS (displays normally)
- Alice without CSS (the display issues are intentional)